Understand the crux of legacy systems ? their architecture, analysis, and security constraints
The latest edition to our range of products is Packt Select - the new range of books with a broad spectrum of information on unique topics. We have identified your requirements, searched for the best books available, and we now offer these to you. With these books, you'll enjoy a smooth learning experience with the usual Packt "must-haves" of real-world examples and best practices.
New technologies are continuously being introduced in the I.T. industry. While learning those is important, maintaining legacy systems is equally necessary to ensure that the I.T infrastructure of your organization functions to its best abilities. Sound knowledge of techniques that can be used for maintaining legacy systems, can help you avoid many pitfalls.
You'll begin the book with a quick understanding of what a legacy system looks like, how it works, and what are some common issues in it. Then, you'll explore the architecture of a legacy system in detail and learn each of its components. You'll learn and use various techniques to analyze a legacy system. After learning about the security constraints associated with legacy systems, you'll explore ways to overcome these constraints and secure the systems. Towards the end of the book, you'll learn how easily make changes in the legacy systems to enhance their performance.
By the end of this book, you'll have skills and confidence to work with legacy systems and efficiently maintain them.
This book is ideal for IT professionals, who want to understand the working and maintenance of the legacy systems. Prior knowledge of working with legacy systems is not needed to complete this book.
"synopsis" may belong to another edition of this title.
Robert Annett has been a developer since 1995 and has worked in industries from energy management to investment banking. Much of his work has involved upgrading and migrating legacy systems, with the occasional green-field project (involving integration to legacy systems, of course). He has worked in the IT industry long enough to realize that all successful systems become legacy eventually.
"About this title" may belong to another edition of this title.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9781838982560_new
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9781838982560
Quantity: Over 20 available
Seller: Rarewaves.com UK, London, United Kingdom
Paperback. Condition: New. Understand the crux of legacy systems-their architecture, analysis, and security constraintsKey FeaturesUnderstand what legacy systems are and strategies for their maintenanceExplore basic and advanced architectures of legacy systemsDiscover how to analyze and secure legacy systemsBook DescriptionThe IT industry is constantly evolving with the introduction of new technologies. While it is important to keep up with advancements, maintaining legacy systems is equally necessary to ensure that the infrastructure of your organization functions to the best of its ability. Sound knowledge of techniques that can be used for maintaining legacy systems can help you avoid common pitfalls.The book begins with a quick overview of what a real legacy system looks like, how it works, and common issues that may be faced when trying to maintaining it. You'll then explore the architecture of a legacy system in detail and understand each of its components. As you progress, you'll discover a variety of techniques for analyzing a legacy system and how to apply them. Once you get to grips with the security constraints associated with legacy systems, you'll explore ways to secure them. Finally, you'll be able to easily make changes in legacy systems to enhance their performance.By the end of this book, you'll have developed the skills and confidence to work with legacy systems and efficiently maintain them.What you will learnPerform static and dynamic analyses of legacy systemsImplement best practices to secure your legacy systemsUse techniques such as data cleansing and process cleansing to stabilize your systemApply structural changes in your legacy system to make it highly availableIdentify and resolve common issues with legacy systemsUnderstand a variety of tests that can help you secure and maintain legacy systemsWho this book is forIf you're new to working with legacy systems and want to understand how they work and how to maintain them, this book is for you. Seller Inventory # LU-9781838982560
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 354. Seller Inventory # C9781838982560
Quantity: Over 20 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 152. Seller Inventory # 369453533
Quantity: 4 available
Seller: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condition: New. Working with Legacy Systems 0.6. Book. Seller Inventory # BBS-9781838982560
Quantity: 5 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering. Seller Inventory # 9781838982560
Quantity: 1 available
Seller: moluna, Greven, Germany
Condition: New. The IT industry is obsessed with new technologies. Courses, books, and magazines mostly focus on what is new. Starting with what a legacy system looks like to applying various techniques for maintaining and securing these systems, this book gives you all th. Seller Inventory # 448361124
Quantity: Over 20 available
Seller: Rarewaves.com USA, London, LONDO, United Kingdom
Paperback. Condition: New. Understand the crux of legacy systems-their architecture, analysis, and security constraintsKey FeaturesUnderstand what legacy systems are and strategies for their maintenanceExplore basic and advanced architectures of legacy systemsDiscover how to analyze and secure legacy systemsBook DescriptionThe IT industry is constantly evolving with the introduction of new technologies. While it is important to keep up with advancements, maintaining legacy systems is equally necessary to ensure that the infrastructure of your organization functions to the best of its ability. Sound knowledge of techniques that can be used for maintaining legacy systems can help you avoid common pitfalls.The book begins with a quick overview of what a real legacy system looks like, how it works, and common issues that may be faced when trying to maintaining it. You'll then explore the architecture of a legacy system in detail and understand each of its components. As you progress, you'll discover a variety of techniques for analyzing a legacy system and how to apply them. Once you get to grips with the security constraints associated with legacy systems, you'll explore ways to secure them. Finally, you'll be able to easily make changes in legacy systems to enhance their performance.By the end of this book, you'll have developed the skills and confidence to work with legacy systems and efficiently maintain them.What you will learnPerform static and dynamic analyses of legacy systemsImplement best practices to secure your legacy systemsUse techniques such as data cleansing and process cleansing to stabilize your systemApply structural changes in your legacy system to make it highly availableIdentify and resolve common issues with legacy systemsUnderstand a variety of tests that can help you secure and maintain legacy systemsWho this book is forIf you're new to working with legacy systems and want to understand how they work and how to maintain them, this book is for you. Seller Inventory # LU-9781838982560
Quantity: Over 20 available
Seller: dsmbooks, Liverpool, United Kingdom
Paperback. Condition: New. New. book. Seller Inventory # D7F7-5-M-1838982566-6
Quantity: 1 available